{ads}

New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain



June 21, 2022 at 01:32PM

A new kind of Windows NTLM relay attack dubbed DFSCoerce has been uncovered that leverages the Distributed File System (DFS): Namespace Management Protocol (MS-DFSNM) to seize control of a domain. "Spooler service disabled, RPC filters installed to prevent PetitPotam and File Server VSS Agent Service not installed but you still want to relay [Domain Controller authentication to [Active Directory

from The Hacker News https://ift.tt/SYnOqiF

0 Response to "New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain"

Post a Comment

Article Top Ads

Central Ads Article 1

Middle Ads Article 2

Article Bottom Ads